Which protocol is used to exchange control information between the participating multichassis LAG (MC-LAG) pee
Which protocol is used to exchange control information between the participating multichassis LAG (MC-LAG) peers? A. BGP B. OSPF C. ICCP D. VCCP
Your company wants to expand operations and build small data centers in locations where it is difficult to mai
Your company wants to expand operations and build small data centers in locations where it is difficult to maintain physical routing equipment. You must recommend a Juniper product that minimizes this issue. Which product would you recommend in this situation? A. MX104 B. vMX C. vRR D. Virtual Chassis
Which two Layer 2 Data Center Interconnect redundancy options support active/active forwarding?
Which two Layer 2 Data Center Interconnect redundancy options support active/active forwarding? (Choose two.) A. VPLS LAG B. point-to-point LAG C. EVPN multihoming D. VPLS multihoming
Which two statements describe SDN?
Which two statements describe SDN? (Choose two.) A. SDN can alleviate the need for manually configuring each network device. B. SDN moves forwarding functions to a centralized management platform. C. SDN combines the control plane and the forwarding plane into a single fabric. D. SDN moves compute intensive functions to a centralized controller.
You are designing a large IP fabric and must determine if you should use IBGP or EBGP to signal your underlay.
You are designing a large IP fabric and must determine if you should use IBGP or EBGP to signal your underlay. Which statement is correct in this scenario? A. EBGP will require that an IGP is also configured for load balancing. B. EBGP will require a full mesh on all devices for load balancing. C. […]
You are asked to deploy data classification measures in your network.
You are asked to deploy data classification measures in your network. You are analyzing an e-mail and notice several employees in the cc list but the e-mail does not appear to contain any sensitive data, such as security logs or financial reports. In this scenario, how should this data be classified? A. public B. encrypted […]
Which two scripting languages are supported for creating on-box scripts?
Which two scripting languages are supported for creating on-box scripts? (Choose two.) A. Python B. Chef C. SLAX D. Ansible Reference: https://www.juniper.net/documentation/us/en/software/junos/automation-scripting/automation-scripting.pdf
You are asked to design security policies based on team membership.
You are asked to design security policies based on team membership. Which access control methodology should you use in this scenario? A. non-discretionary access control B. role-based access control C. mandatory access control D. discretionary access control
You have a highly latency-sensitive application that is mission critical to your company’s operation.
You have a highly latency-sensitive application that is mission critical to your company’s operation. In this scenario, what will enable you to identify issues within three second accuracy? A. JTI B. RMON1 C. LDAP D. RMON2